Classify the following scenario as major or minor non-conformity.
''The organization has a very mature information security policy. Lately, the organization has realized the need to focus on protection of PI. A formal PI identification exercise was done for this purpose and a mapping of PI and security controls was done. The organization has also put in place data masking technology in certain functions where the SPI was accessed by employees of a third party. However, the organization is yet to include PI specifically in its risk assessment exercise, incident management, testing, data classification and security architecture programs.''
Maryln
8 months agoLynelle
8 months agoGlendora
8 months agoAlishia
8 months agoMirta
8 months agoNatalie
8 months agoElly
8 months agoDesmond
9 months agoRemona
9 months agoMarylou
8 months agoLanie
8 months agoNieves
8 months agoPearline
9 months agoBritt
9 months agoDanilo
8 months agoTheola
8 months agoFrancoise
8 months agoEdward
9 months agoLatricia
9 months agoTheodora
9 months agoDarrel
9 months agoSean
9 months agoCarissa
10 months agoRosendo
10 months agoJody
8 months agoTrina
8 months agoDonte
9 months agoIrma
9 months agoElly
10 months ago